Public bug reported:

From the profile itself:

# The purpose of this profile isn't to confine man itself (that might be
# nice in the future, but is tricky since it's quite configurable), but to
# confine the processes it calls that parse untrusted data.
/** mrixwlk,


This is not an acceptable use of apparmor. The replacement below will handle 
95% of the cases.

owner /dev/pts/[0-9]* rw,
/dev/tty rw,
/usr/share/terminfo/** r,

/etc/groff/man.local r,
/etc/manpath.config r,
/usr/bin/grotty ixr,
/usr/bin/{,g,n}roff rmCx -> &man_groff,
/usr/local/share/man/{,**} r,
/usr/share/groff/** r,
/usr/share/man/{,**} r,
/var/cache/man/index.db rkw,
/{,usr/}bin/less{,file,pipe} rix,
@{HOME}/.local/share/man/index.db rkw,
@{HOME}/.local/{,share/}man/{,**} r,


Other improvements include usage of
#include <abstractions/groff>

and a couple of:
/{usr/,}bin/dash ixr,
/usr/bin/{,g,n}roff ixr,

here and there.
Unsetting LESSHISTFILE is also advised to avoid less doing (useless) histfile 
(re)write attempts.


The above changes means accessing a handful of files, dropping
read/write access to the whole filesystem and still fulfilling the vast
majority of `man` usages. (Users configuring `man` can generally
interpret `journalctl` apparmor warnings and/or configure it). A comment
in the file could even ease the task, like:

# uncomment the line below if man fails edge-cases
# /** mrixwlk,


See also #1788973

** Affects: apparmor (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: aa-policy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2102696

Title:
  insecure usr.bin.man profile

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2102696/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to